US9483889B2 - Method for controlling an electronically secured device and transponder for it - Google Patents

Method for controlling an electronically secured device and transponder for it Download PDF

Info

Publication number
US9483889B2
US9483889B2 US14/198,233 US201414198233A US9483889B2 US 9483889 B2 US9483889 B2 US 9483889B2 US 201414198233 A US201414198233 A US 201414198233A US 9483889 B2 US9483889 B2 US 9483889B2
Authority
US
United States
Prior art keywords
transponder
access authorization
information
authorization information
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US14/198,233
Other versions
US20140300446A1 (en
Inventor
Matthias Notheis
Andreas Heberer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GM Global Technology Operations LLC
Original Assignee
GM Global Technology Operations LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GM Global Technology Operations LLC filed Critical GM Global Technology Operations LLC
Assigned to GM Global Technology Operations LLC reassignment GM Global Technology Operations LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEBERER, ANDREAS, NOTHEIS, MATTHIAS
Publication of US20140300446A1 publication Critical patent/US20140300446A1/en
Application granted granted Critical
Publication of US9483889B2 publication Critical patent/US9483889B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • G07C9/00111
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Definitions

  • the present disclosure relates to a method for controlling an electronically secured device, as well as to a transponder suitable for implementing the method.
  • a transponder for controlling an engine immobilizer of a motor vehicle is known from DE 195 33 309 A1.
  • This conventional transponder relays a fixed code and alternating code to a transceiver unit in the vehicle, whereupon the engine immobilizer enables motor vehicle startup if both codes match expectations.
  • the same transponder can also be used for opening doors equipped with a corresponding transceiver unit in the household area, wherein transmitting only the fixed code is to suffice for opening these doors.
  • Transponder systems for actuating door locks are in widespread use in the hospitality industry.
  • the transponders in such systems are traditionally designed as plastic cards the size of check cards with a data storage.
  • a recorder loads it with access authorization information specific to the door of the room along with time limit information.
  • access authorization information specific to the door of the room along with time limit information.
  • the lock is opened if the access authorization information matches the room door, and the transmission takes place within a period of validity specified in the time limit information, i.e., within the envisaged timeframe in which the guest uses the room. The lock will not open after this time has expired.
  • An object of the present disclosure is to indicate a method and means for its implementation, which enable an efficient utilization of a mobile device, in particular a motor vehicle, regardless of how conscientious or cooperative the individual users are.
  • the object is achieved in accordance with the following method: (a) access authorization information is sent from an electrical access management system to the transponder; (b) the access authorization information is received by the transponder; (c) the access authorization information is transmitted from the transponder to the device, and (d) a function of the device is activated if the received access authorization information matches reference information belonging to the device. Transmission in (a) takes place via a mobile communications link.
  • the method described above makes it possible to circulate a large number of transponders; since the ability to use the device does not depend on having a transponder, but rather on whether the transponder has the access authorization information, control over the ways in which a potential user can access the device remains with the access management system. Therefore, the owner of the device does not have to retrieve a transponder after it has been used by the user. As a result, the transponder can be in the possession of the users.
  • the ability to use transponders procured by the users out of their own self-interest and at their own expense, in particular the use of mobile phones as transponders, can significantly reduce the costs of implementing the method.
  • the device to be controlled with the method is preferably a motor vehicle or a component thereof, in particular a lock or engine immobilizer.
  • the transmission in (c) is preferably encrypted so as to make it harder for a transponder that fraudulently imitates the access authorization information to deceive the device to be controlled.
  • the electronic access management system could of course also send out information that revokes the access authorization.
  • the electronic access management system could of course also send out information that revokes the access authorization.
  • it makes sense to transmit not just the access authorization information from the access management system to the transponder in (a), but also time limit information that specifies the period of validity for the access authorization information.
  • transponder This allows the transponder to check this time limit information in (c), and transmit the access authorization information to the device only within the validity period of the access authorization information. Because the transponder no longer transmits the access authorization after the validity period has expired, it becomes ineffective, and the owner of the transponder, if he or she wishes to again use it to control the device, must request renewed transmission of access authorization and time limit information from the access management system.
  • the transponder can itself generate time limit information for this purpose upon receiving access authorization information from the access management system.
  • This validity period can be shorter than a duration of use for the device agreed upon between the person having the transponder and the owner of the device; it would then be in the interest of the person having the transponder to make sure that the transponder can receive access authorization information repeatedly sent out by the access management system during the agreed period of use.
  • the transponder can make sense for the transponder to send the time limit information to the device, the device to check the time limit information, and only execute in (d) within the validity period of the access authorization information.
  • time limit information and access authorization information be encrypted dependent on each other. Even if a malicious user manages to intercept the encrypted information transmitted in step c), the dependent encryption ensures that he or she will be unable to break the transmitted information down into access authorization and time limit information and manipulate the time limit information, thereby fraudulently allowing him or her continued use.
  • the device may itself generate time limit information after access authorization information has been received by the transponder when first implementing (c), and for the device to check the time limit information based on the same access authorization information when again implementing (c), and only implement (d) within the validity period of the access authorization information. This ensures that each piece of access authorization information is only valid for a limited time, so that, to be able to use the device for a longer time, the user must ensure that his or her transponder receives access authorization information newly sent out by the access management system in a timely fashion beforehand.
  • the present disclosure further relates to a transponder, with which the method described above can be implemented.
  • a transponder encompasses a memory for storing access authorization information, a first communication interface for transmitting the access authorization to a device to be controlled, and a mobile communication interface as a second communication interface for receiving the access authorization.
  • the transponder is preferably a mobile phone.
  • modern mobile phones, in particular smart phones often also have another communications interface for wirelessly communicating with other devices, e.g., via Bluetooth or WLAN, which can be used within the framework of the present disclosure for communicating with the device to be controlled. Therefore, such a smart phone only requires suitable programming to be able to work as a transponder within the framework of the present disclosure.
  • the present disclosure thus further relates to a computer program product that encompasses instructions which, when executed on a computer, in particular a mobile computer, such as a smart phone, allow the latter to work as a transponder as described above or in a method as described above.
  • a car sharing provider can make such a computer program product available to his or her registered customers.
  • the present disclosure further relates to a computer readable data carrier, recorded on which are program instructions that allow a computer to work as a transponder or in a method as described above.
  • FIG. 1 is a block diagram of a system according to the present disclosure
  • FIG. 2 is a flowchart depicting how the various system components shown on FIG. 1 operate according to a first embodiment
  • FIG. 3 is a second embodiment of an operating method
  • FIG. 4 is a third embodiment of an operating method
  • FIG. 5 is a fourth embodiment of an operating method.
  • the system shown on FIG. 1 encompasses three types of components, an access management system 1 , any number of transponders 2 desired, as well as devices 3 that can be controlled by the transponders 2 . Further on, the description assumes that the transponders 2 are mobile phones, and the devices 3 to be controlled are motor vehicles in a fleet; the expert should have no difficulties applying the basic principles of the present disclosure described below to other types of transponders capable of mobile communications and devices to be controlled.
  • the access management system 1 encompasses a computer 4 of a known design, in particular a personal computer, and a mobile communication network 5 , to which the computer 4 is connected for sending out messages, especially text messages.
  • the computer encompasses a management unit 6 and preferably an encryption unit 7 for encrypting specific data in the messages to be sent out via the mobile communication network, as will be described in even greater detail below.
  • a dataset is filed in a database of the management unit 6 for each of the devices 3 to be controlled.
  • Each dataset contains publically known data specific to the device 3 to which the dataset belongs, for example, in the case of a motor vehicle, its license number and reference information not known to the public.
  • the dataset can contain information about whether a user has access to the device or vehicle, the identity of this user and the period for which he or she has been granted this access.
  • An operator 8 receives applications from potential users for a grant of access.
  • the users can use their mobile phones 2 and the mobile communication network 5 to send their applications to the operator 8 .
  • the operator 8 derives the user identity, possible vehicle preferences, and duration of the desired access from the application, and if he or she wants to grant access to the vehicle, inputs these data into the management unit 6 .
  • the operator 8 can be a person using a management unit 6 to communicate via a conventional user interface of the computer, it can also take the form of a program running on the computer 4 or a second computer networked with the computer 4 .
  • the management unit 6 determines whether a vehicle is present that satisfies the criteria indicated in the application. If such a vehicle is present, the management unit 6 outputs the reference information for the selected vehicle along with any other information explained in even more detail in conjunction with FIGS. 2 to 4 to the encryption unit 7 .
  • the management unit 6 uses the encrypted information to generate a text message, which is sent to the mobile phone 2 of the applicant over the mobile communication network 5 .
  • the call number of the phone 2 required for this purpose can be gleaned from the application, or from a dataset of the applicant stored in the management unit 6 .
  • the mobile communication network 5 buffers the text message in a known manner until a base station 9 of the network with a range including the mobile phone 2 has been determined, and transmits the text message once a communication link to the mobile phone 2 has been established.
  • the mobile phone 2 encompasses a mobile communication interface 10 , a processor 11 for processing the received text messages, along with an interface 12 for communicating with a vehicle 3 .
  • a timer 13 can be provided for specific embodiments of the operating method described below.
  • the interface 12 is preferably wireless, e.g., a Bluetooth or WLAN interface; however, this does not preclude hard-wired communication with the vehicle 3 .
  • the vehicle 3 encompasses an interface 14 complementary to the interface 12 of the transponder, preferably a decryption unit 15 , a processor 16 , optionally a timer 17 , as well as an assembly 18 controlled by the processor 16 , such as a door lock, an engine immobilizer or the like.
  • FIG. 1 Various embodiments of operating methods for the system depicted on FIG. 1 will be explained below with reference to FIGS. 2 to 4 . It is here assumed that the operator 8 has already received an application from a user for grant of access to a vehicle 3 .
  • step S 1 involves determining a vehicle 3 to which the user is to be granted access, along with how long this access is to be granted.
  • the vehicle can be determined by having the operator 8 input the publically known designation n of the vehicle in question or by having the management unit 6 selects a suitable vehicle based on other specifications in the application or of the operator.
  • step S 2 the private reference information r relating to the selected vehicle n is retrieved from the database.
  • step S 3 encrypted information k is generated from the reference information r and timeframe t of the granted access.
  • the encryption of r and t is interdependent, i.e., the encrypted information k does not contain any group of bits that would be independent of t and can be allocated only to r, making it impossible for an unauthorized party without knowledge of the encryption algorithm to generate valid encrypted information k′ that corresponds to the same reference information r, but a different access authorization period t′.
  • step S 4 the encrypted information k is output to the mobile communication system 5 as a text message addressed to the mobile phone 2 of the user.
  • processing in the mobile phone 2 is limited to receiving the text message with the encrypted information k (step S 11 ), waiting for the user to make an entry, e.g., press a key on the mobile phone 2 having assigned to it an “unlock vehicle door” or “disable engine immobilizer” function within the framework of the operating method according to the present disclosure, and, if such an entry takes place in step S 12 , sending out the encrypted information k (S 13 ).
  • Steps S 12 , S 13 can be repeated as often and long as desired, even after time interval t has expired.
  • step S 21 the vehicle 3 receives the encrypted information k sent out by the transponder 2 in step S 13 .
  • Information k is decrypted into r, t in step S 22 . If the decryption fails, for example because a manipulated value k′ that is not a valid result of the encryption in step S 3 was received instead of the correct encryption result k, processing ends at this point without any response by the vehicle 3 (S 24 ).
  • step S 23 it is decided whether the current time supplied by the timer 17 falls within interval t. If not, the period of use allotted to the user has expired, and processing ends (S 24 ) without the door unlocking or the vehicle starter being enabled.
  • the reference information r obtained through decryption is in step S 25 compared with reference information specific to the vehicle 3 stored in the processor 16 .
  • the user of the transponder 2 has obviously tried to access a vehicle for which he or she has no access authorization, and processing ends with step S 24 . If the received reference information r matches the stored reference information, the user is authorized, and the processor 16 actuates the assembly 18 , so as to unlock the door or disable the engine immobilizer.
  • step S 3 ′ in which the encrypted information k is not generated based on reference information r and time interval t, but rather based on the current date d, possibly defined more precisely by the current time of day.
  • the encrypted information k is sent out to the mobile phone 2 in step S 4 , and a prescribed time span ⁇ , e.g., a day, is allowed to elapse in step S 5 , after which it is determined whether the current time still lies within the approved time interval t in step S 6 . If so, the method returns to step S 3 ′ to once again encrypt reference information r, this time as a function of the now current time d, and send a new text message in step S 4 . In this way, the mobile phone receives a new message from the management unit with information k newly encrypted at the respective current time d throughout the approved time interval t after the respective time span ⁇ has elapsed.
  • a prescribed time span ⁇ e.g., a day
  • Steps S 11 and S 12 of the transponder 2 are again the same as on FIG. 2 , but receiving the text message in step S 11 is immediately followed by starting the timer 13 of the transponder in step S 14 .
  • the timer 13 is set up to measure a time interval t′ whose length corresponds to the wait time ⁇ or, to account for possible delays in text message transmission, slightly exceeds ⁇ . If the user actuates the mobile phone 2 in step S 12 so as to thereby unlock the vehicle door or disable the engine immobilizer, the processor 11 first checks whether the time span t′ measured by the timer 13 is still running in step S 15 . Only if this time span t′ has not elapsed is the encrypted information k transmitted to the vehicle 3 in step S 13 .
  • Decrypting information k on the vehicle side in step S 22 yields the reference information r and time d at which the text message was sent out via the access management system 1 . Since the mobile phone 2 only sends the encrypted information k if it has a valid approval in this embodiment of the method, checking the encrypted information in terms of the vehicle 3 can be confined to determining whether k is a valid encryption result and whether the received reference information r matches the stored reference information (S 25 ).
  • procedural steps S 1 -S 6 are identical to those on FIG. 3 in terms of the access management system 1 , while procedural steps S 11 -S 13 are the same as those on FIG. 2 with regard to the mobile phone 2 .
  • the encrypted value k is again received in step S 21 and decrypted into reference information r and the date sent d in step S 22 . If decryption is successful, a check is performed in step S 23 ′ to determine whether the current time supplied by the timer 17 does not come after encryption time d by more than the time span. If this is the case, the access authorization is valid, and access is granted in step S 26 if the reference information r also matches.
  • the method on FIG. 5 is identical to the one on FIG. 4 , to include the decryption step S 22 as well. If decryption is successful, the ensuing check S 25 determines whether the transmitted reference information r matches the stored reference information. If so, a check is performed in step S 27 to determine whether the date d was transmitted for the first time. If so, the timer 17 is initiated in step S 28 before the method proceeds to step S 26 .
  • the user By first transmitting information k from the transponder 2 to the vehicle 3 , the user sets in motion a time span with duration ⁇ , in which he or she can use the vehicle. If information k is again transmitted to the vehicle after this time interval has elapsed, a determination is made in S 23 that the timer 17 has expired, and use of the vehicle 3 is denied (S 24 ).

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A method for controlling an electronically secured device by means of a transponder has the following procedural steps:
  • a) Access authorization information is sent from an electrical access management system to the transponder via a mobile communications link,
  • b) The access authorization information is received by the transponder,
  • c) The access authorization information is transmitted from the transponder to the device, and
  • d) A function of the device is activated if the received access authorization information matches reference information belonging to the device.

Description

CROSS REFERENCE TO RELATED APPLICATION
This application claims priority to German Patent Application No. 102013003799.9 filed Mar. 5, 2013, which is incorporated herein by reference in its entirety.
TECHNICAL FIELD
The present disclosure relates to a method for controlling an electronically secured device, as well as to a transponder suitable for implementing the method.
BACKGROUND
A transponder for controlling an engine immobilizer of a motor vehicle is known from DE 195 33 309 A1. This conventional transponder relays a fixed code and alternating code to a transceiver unit in the vehicle, whereupon the engine immobilizer enables motor vehicle startup if both codes match expectations. The same transponder can also be used for opening doors equipped with a corresponding transceiver unit in the household area, wherein transmitting only the fixed code is to suffice for opening these doors. While consideration has been given to the capability of changing the fixed code transmitted by the key given a change in vehicles, this can only be accomplished with a significant outlay, and relies upon compliance with safety measures aimed at preventing an inadvertent change, resulting in a situation where the transponder can no longer be used for opening the doors in the household area.
Transponder systems for actuating door locks are in widespread use in the hospitality industry. The transponders in such systems are traditionally designed as plastic cards the size of check cards with a data storage. Before such a transponder is given to a hotel guest as the key to his or her room, a recorder loads it with access authorization information specific to the door of the room along with time limit information. When the guest holds the transponder up to a reader on the lock to his or her room door, both pieces of information are transmitted, and the lock is opened if the access authorization information matches the room door, and the transmission takes place within a period of validity specified in the time limit information, i.e., within the envisaged timeframe in which the guest uses the room. The lock will not open after this time has expired. If a guest stays longer than specified by the loaded time limit information upon being given the transponder, he or she must switch the transponder or have new information recorded at reception. If a departing guest fails to return the transponder, this known transponder system allows a new tenant to use the same system with another transponder, and opening the door without authorization using the unreturned transponder is impossible. The problem with rental cars or vehicles in a company fleet or car sharing pool is that each person who would like to use a vehicle traditionally needs a suitable key. Since each person with a key can use the vehicle to which the key belongs, it makes sense to the operator of a car fleet for there to only be a small number of keys to each vehicle. This allows him or her to keep the rather high costs for the keys within limits on the one hand and on the other hand eliminates the risk of conflicts between potential users of a vehicle if only a single user is in possession of a key. At the same time, too low a number of keys impedes the efficient use of the fleet, since one user can prevent another from using a vehicle by not returning his or her key when done. The known transponder system described above is not suitable for vehicles, since a user can only procure a usable transponder where the recorder is located. However, he or she cannot automatically just proceed to the location of the vehicle if a previous user has not parked it at the site of the recorder. However, it would be highly appealing in particular to users in a car sharing pool to be able to decide whether or not they wish to use a parked vehicle in the pool at the location where they find it, potentially doing so right away.
SUMMARY
An object of the present disclosure is to indicate a method and means for its implementation, which enable an efficient utilization of a mobile device, in particular a motor vehicle, regardless of how conscientious or cooperative the individual users are.
Within the framework of a method for controlling an electronically secured device by mean of a transponder, the object is achieved in accordance with the following method: (a) access authorization information is sent from an electrical access management system to the transponder; (b) the access authorization information is received by the transponder; (c) the access authorization information is transmitted from the transponder to the device, and (d) a function of the device is activated if the received access authorization information matches reference information belonging to the device. Transmission in (a) takes place via a mobile communications link.
The method described above makes it possible to circulate a large number of transponders; since the ability to use the device does not depend on having a transponder, but rather on whether the transponder has the access authorization information, control over the ways in which a potential user can access the device remains with the access management system. Therefore, the owner of the device does not have to retrieve a transponder after it has been used by the user. As a result, the transponder can be in the possession of the users. The ability to use transponders procured by the users out of their own self-interest and at their own expense, in particular the use of mobile phones as transponders, can significantly reduce the costs of implementing the method.
The device to be controlled with the method is preferably a motor vehicle or a component thereof, in particular a lock or engine immobilizer. The transmission in (c) is preferably encrypted so as to make it harder for a transponder that fraudulently imitates the access authorization information to deceive the device to be controlled.
In addition to the access authorization information, the electronic access management system could of course also send out information that revokes the access authorization. However, since there is no guarantee that such a revocation will be received by the transponder via the mobile communications link, in particular if a user is obviously preventing the transponder from establishing a mobile communications link, it makes sense to transmit not just the access authorization information from the access management system to the transponder in (a), but also time limit information that specifies the period of validity for the access authorization information.
This allows the transponder to check this time limit information in (c), and transmit the access authorization information to the device only within the validity period of the access authorization information. Because the transponder no longer transmits the access authorization after the validity period has expired, it becomes ineffective, and the owner of the transponder, if he or she wishes to again use it to control the device, must request renewed transmission of access authorization and time limit information from the access management system.
As an alternative, the transponder can itself generate time limit information for this purpose upon receiving access authorization information from the access management system. This validity period can be shorter than a duration of use for the device agreed upon between the person having the transponder and the owner of the device; it would then be in the interest of the person having the transponder to make sure that the transponder can receive access authorization information repeatedly sent out by the access management system during the agreed period of use.
To make it harder for a manipulated transponder to deceive the device, it can make sense for the transponder to send the time limit information to the device, the device to check the time limit information, and only execute in (d) within the validity period of the access authorization information.
For this purpose, it is especially beneficial to have the time limit information and access authorization information be encrypted dependent on each other. Even if a malicious user manages to intercept the encrypted information transmitted in step c), the dependent encryption ensures that he or she will be unable to break the transmitted information down into access authorization and time limit information and manipulate the time limit information, thereby fraudulently allowing him or her continued use.
Also conceivable is for the device to itself generate time limit information after access authorization information has been received by the transponder when first implementing (c), and for the device to check the time limit information based on the same access authorization information when again implementing (c), and only implement (d) within the validity period of the access authorization information. This ensures that each piece of access authorization information is only valid for a limited time, so that, to be able to use the device for a longer time, the user must ensure that his or her transponder receives access authorization information newly sent out by the access management system in a timely fashion beforehand.
The present disclosure further relates to a transponder, with which the method described above can be implemented. Such a transponder encompasses a memory for storing access authorization information, a first communication interface for transmitting the access authorization to a device to be controlled, and a mobile communication interface as a second communication interface for receiving the access authorization.
The transponder is preferably a mobile phone. In addition to the mobile communications interface, modern mobile phones, in particular smart phones, often also have another communications interface for wirelessly communicating with other devices, e.g., via Bluetooth or WLAN, which can be used within the framework of the present disclosure for communicating with the device to be controlled. Therefore, such a smart phone only requires suitable programming to be able to work as a transponder within the framework of the present disclosure. The present disclosure thus further relates to a computer program product that encompasses instructions which, when executed on a computer, in particular a mobile computer, such as a smart phone, allow the latter to work as a transponder as described above or in a method as described above. For example, a car sharing provider can make such a computer program product available to his or her registered customers.
The present disclosure further relates to a computer readable data carrier, recorded on which are program instructions that allow a computer to work as a transponder or in a method as described above.
BRIEF DESCRIPTION OF THE DRAWINGS
The present disclosure hereinafter will be described in conjunction with the following drawing figures, wherein like numerals denote like elements, and:
FIG. 1 is a block diagram of a system according to the present disclosure;
FIG. 2 is a flowchart depicting how the various system components shown on FIG. 1 operate according to a first embodiment;
FIG. 3 is a second embodiment of an operating method;
FIG. 4 is a third embodiment of an operating method, and
FIG. 5 is a fourth embodiment of an operating method.
DETAILED DESCRIPTION
The following detailed description is merely exemplary in nature and is not intended to limit the present disclosure or the application and uses of the present disclosure. Furthermore, there is no intention to be bound by any theory presented in the preceding background or the following detailed description.
The system shown on FIG. 1 encompasses three types of components, an access management system 1, any number of transponders 2 desired, as well as devices 3 that can be controlled by the transponders 2. Further on, the description assumes that the transponders 2 are mobile phones, and the devices 3 to be controlled are motor vehicles in a fleet; the expert should have no difficulties applying the basic principles of the present disclosure described below to other types of transponders capable of mobile communications and devices to be controlled.
The access management system 1 encompasses a computer 4 of a known design, in particular a personal computer, and a mobile communication network 5, to which the computer 4 is connected for sending out messages, especially text messages. The computer encompasses a management unit 6 and preferably an encryption unit 7 for encrypting specific data in the messages to be sent out via the mobile communication network, as will be described in even greater detail below. A dataset is filed in a database of the management unit 6 for each of the devices 3 to be controlled. Each dataset contains publically known data specific to the device 3 to which the dataset belongs, for example, in the case of a motor vehicle, its license number and reference information not known to the public. In addition, the dataset can contain information about whether a user has access to the device or vehicle, the identity of this user and the period for which he or she has been granted this access.
An operator 8 receives applications from potential users for a grant of access. The users can use their mobile phones 2 and the mobile communication network 5 to send their applications to the operator 8. The operator 8 derives the user identity, possible vehicle preferences, and duration of the desired access from the application, and if he or she wants to grant access to the vehicle, inputs these data into the management unit 6. While the operator 8 can be a person using a management unit 6 to communicate via a conventional user interface of the computer, it can also take the form of a program running on the computer 4 or a second computer networked with the computer 4.
The management unit 6 determines whether a vehicle is present that satisfies the criteria indicated in the application. If such a vehicle is present, the management unit 6 outputs the reference information for the selected vehicle along with any other information explained in even more detail in conjunction with FIGS. 2 to 4 to the encryption unit 7. The management unit 6 uses the encrypted information to generate a text message, which is sent to the mobile phone 2 of the applicant over the mobile communication network 5. The call number of the phone 2 required for this purpose can be gleaned from the application, or from a dataset of the applicant stored in the management unit 6.
The mobile communication network 5 buffers the text message in a known manner until a base station 9 of the network with a range including the mobile phone 2 has been determined, and transmits the text message once a communication link to the mobile phone 2 has been established.
The mobile phone 2 encompasses a mobile communication interface 10, a processor 11 for processing the received text messages, along with an interface 12 for communicating with a vehicle 3. A timer 13 can be provided for specific embodiments of the operating method described below. The interface 12 is preferably wireless, e.g., a Bluetooth or WLAN interface; however, this does not preclude hard-wired communication with the vehicle 3.
The vehicle 3 encompasses an interface 14 complementary to the interface 12 of the transponder, preferably a decryption unit 15, a processor 16, optionally a timer 17, as well as an assembly 18 controlled by the processor 16, such as a door lock, an engine immobilizer or the like.
Various embodiments of operating methods for the system depicted on FIG. 1 will be explained below with reference to FIGS. 2 to 4. It is here assumed that the operator 8 has already received an application from a user for grant of access to a vehicle 3.
In the method on FIG. 2, step S1 involves determining a vehicle 3 to which the user is to be granted access, along with how long this access is to be granted. The vehicle can be determined by having the operator 8 input the publically known designation n of the vehicle in question or by having the management unit 6 selects a suitable vehicle based on other specifications in the application or of the operator.
In step S2, the private reference information r relating to the selected vehicle n is retrieved from the database.
In step S3, encrypted information k is generated from the reference information r and timeframe t of the granted access. The encryption of r and t is interdependent, i.e., the encrypted information k does not contain any group of bits that would be independent of t and can be allocated only to r, making it impossible for an unauthorized party without knowledge of the encryption algorithm to generate valid encrypted information k′ that corresponds to the same reference information r, but a different access authorization period t′.
In step S4, the encrypted information k is output to the mobile communication system 5 as a text message addressed to the mobile phone 2 of the user.
In this embodiment of the method, processing in the mobile phone 2 is limited to receiving the text message with the encrypted information k (step S11), waiting for the user to make an entry, e.g., press a key on the mobile phone 2 having assigned to it an “unlock vehicle door” or “disable engine immobilizer” function within the framework of the operating method according to the present disclosure, and, if such an entry takes place in step S12, sending out the encrypted information k (S13). Steps S12, S13 can be repeated as often and long as desired, even after time interval t has expired.
In step S21, the vehicle 3 receives the encrypted information k sent out by the transponder 2 in step S13. Information k is decrypted into r, t in step S22. If the decryption fails, for example because a manipulated value k′ that is not a valid result of the encryption in step S3 was received instead of the correct encryption result k, processing ends at this point without any response by the vehicle 3 (S24). In step S23, it is decided whether the current time supplied by the timer 17 falls within interval t. If not, the period of use allotted to the user has expired, and processing ends (S24) without the door unlocking or the vehicle starter being enabled. By contrast, if the current point in time lies within the approved interval, the reference information r obtained through decryption is in step S25 compared with reference information specific to the vehicle 3 stored in the processor 16. In the absence of a match, the user of the transponder 2 has obviously tried to access a vehicle for which he or she has no access authorization, and processing ends with step S24. If the received reference information r matches the stored reference information, the user is authorized, and the processor 16 actuates the assembly 18, so as to unlock the door or disable the engine immobilizer.
Several steps in the method depicted on FIG. 3 are identical to those in the method according to FIG. 2. Such steps are marked with the same reference numbers on both figures, and will not be explained again in detail.
The first difference between the methods on FIGS. 2 and 3 involves step S3′, in which the encrypted information k is not generated based on reference information r and time interval t, but rather based on the current date d, possibly defined more precisely by the current time of day. The encrypted information k is sent out to the mobile phone 2 in step S4, and a prescribed time spanΔ, e.g., a day, is allowed to elapse in step S5, after which it is determined whether the current time still lies within the approved time interval t in step S6. If so, the method returns to step S3′ to once again encrypt reference information r, this time as a function of the now current time d, and send a new text message in step S4. In this way, the mobile phone receives a new message from the management unit with information k newly encrypted at the respective current time d throughout the approved time interval t after the respective time span Δ has elapsed.
Steps S11 and S12 of the transponder 2 are again the same as on FIG. 2, but receiving the text message in step S11 is immediately followed by starting the timer 13 of the transponder in step S14. The timer 13 is set up to measure a time interval t′ whose length corresponds to the wait time Δ or, to account for possible delays in text message transmission, slightly exceeds Δ. If the user actuates the mobile phone 2 in step S12 so as to thereby unlock the vehicle door or disable the engine immobilizer, the processor 11 first checks whether the time span t′ measured by the timer 13 is still running in step S15. Only if this time span t′ has not elapsed is the encrypted information k transmitted to the vehicle 3 in step S13.
Decrypting information k on the vehicle side in step S22 yields the reference information r and time d at which the text message was sent out via the access management system 1. Since the mobile phone 2 only sends the encrypted information k if it has a valid approval in this embodiment of the method, checking the encrypted information in terms of the vehicle 3 can be confined to determining whether k is a valid encryption result and whether the received reference information r matches the stored reference information (S25).
In the embodiment of the method depicted on FIG. 4, procedural steps S1-S6 are identical to those on FIG. 3 in terms of the access management system 1, while procedural steps S11-S13 are the same as those on FIG. 2 with regard to the mobile phone 2. The encrypted value k is again received in step S21 and decrypted into reference information r and the date sent d in step S22. If decryption is successful, a check is performed in step S23′ to determine whether the current time supplied by the timer 17 does not come after encryption time d by more than the time span. If this is the case, the access authorization is valid, and access is granted in step S26 if the reference information r also matches.
The method on FIG. 5 is identical to the one on FIG. 4, to include the decryption step S22 as well. If decryption is successful, the ensuing check S25 determines whether the transmitted reference information r matches the stored reference information. If so, a check is performed in step S27 to determine whether the date d was transmitted for the first time. If so, the timer 17 is initiated in step S28 before the method proceeds to step S26. By first transmitting information k from the transponder 2 to the vehicle 3, the user sets in motion a time span with durationΔ, in which he or she can use the vehicle. If information k is again transmitted to the vehicle after this time interval has elapsed, a determination is made in S23 that the timer 17 has expired, and use of the vehicle 3 is denied (S24).
While at least one exemplary embodiment has been presented in the foregoing detailed description, it should be appreciated that a vast number of variations exist. It should also be appreciated that the exemplary embodiment is only an example, and are not intended to limit the scope, applicability, or configuration of the present disclosure in any way. Rather, the foregoing detailed description will provide those skilled in the art with a convenient road map for implementing an exemplary embodiment, it being understood that various changes may be made in the function and arrangement of elements described in an exemplary embodiment without departing from the scope of the present disclosure as set forth in the appended claims and their legal equivalents.

Claims (4)

The invention claimed is:
1. A method for controlling an electronically-secured device by means of a transponder comprising:
sending access authorization information from an electrical access management system to the transponder;
receiving the access authorization information at the transponder via a mobile communication link;
transmitting the access authorization information from the transponder to an electrically-secured device;
activating a function of the electrically-secured device when the received access authorization information matches reference information belonging to the electrically-secured device;
generating time limit information after access authorization information has been received by the transponder, wherein the electrically-secured device specifies a validity period of the access authorization information, and checks the time limit information; and
activating a function of the electrically-secured device only within the validity period of the access authorization information.
2. The method according to claim 1 wherein the device comprises an assembly of a motor vehicle.
3. The method according to claim 2 wherein transmitting the access authorization information from the transponder to an electrically-secured device the device comprises an engine immobilizer of the motor vehicle.
4. The method according to claim 1 wherein transmitting the access authorization information from the transponder to an electrically-secured device further comprises transmitting encrypted access authorization information from the transponder to the electrically-secured device.
US14/198,233 2013-03-05 2014-03-05 Method for controlling an electronically secured device and transponder for it Active 2034-06-09 US9483889B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE102013003799 2013-03-05
DE102013003799.9A DE102013003799A1 (en) 2013-03-05 2013-03-05 Method for controlling an electronically secured device and transponder therefor
DE102013003799.9 2013-03-05

Publications (2)

Publication Number Publication Date
US20140300446A1 US20140300446A1 (en) 2014-10-09
US9483889B2 true US9483889B2 (en) 2016-11-01

Family

ID=51385218

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/198,233 Active 2034-06-09 US9483889B2 (en) 2013-03-05 2014-03-05 Method for controlling an electronically secured device and transponder for it

Country Status (2)

Country Link
US (1) US9483889B2 (en)
DE (1) DE102013003799A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2981028B1 (en) 2014-07-28 2020-05-06 MyLaps B.V. Transponder module and access module for activating and configuring such transponder module over a CAN bus
EP2980759B1 (en) * 2014-07-28 2023-06-07 MyLaps B.V. Transponder module and access module for activating and configuring such transponder module
DE102015005232B4 (en) 2015-04-24 2017-09-28 Audi Ag Controlling a clearance authorization of a motor vehicle
US10200371B2 (en) 2015-11-09 2019-02-05 Silvercar, Inc. Vehicle access systems and methods
US11257315B2 (en) 2016-02-04 2022-02-22 Carrier Corporation Encoder multiplexer for digital key integration

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020174077A1 (en) * 2000-07-27 2002-11-21 Yasuji Yui Rental system for movable body such as vehicle
DE10137579A1 (en) 2001-08-01 2003-02-27 Siemens Ag Method for transmitting an opening code, method for transmitting a locking code and associated units
GB2402840A (en) 2003-06-10 2004-12-15 Guy Frank Howard Walker Mobile with wireless key entry system
US20050044906A1 (en) 2003-07-25 2005-03-03 Spielman Timothy G. Method and system for setting entry codes via a communications network for access to moveable enclosures
US20060048233A1 (en) 2004-08-30 2006-03-02 Robert Buttross Access control system and method
DE102005034477A1 (en) 2005-07-20 2007-01-25 Sebastian Wolf Identifying and/or locking system for use in motor vehicle, has mobile transmitter unit with signal receiving unit, by which determination, modification and storage of signal to be transmitted are effected in controlling receiver unit
US20110112969A1 (en) 2009-10-30 2011-05-12 Gettaround, Inc. Vehicle access control services and platform
DE102010012565A1 (en) 2010-03-23 2011-09-29 Bayerische Motoren Werke Aktiengesellschaft Method for transmission of data to vehicle key for activating vehicle, involves receiving data of service provider by vehicle key, and charging data of service provider by vehicle into vehicle key
US20110288891A1 (en) * 2010-05-03 2011-11-24 Gettaround, Inc. On-demand third party asset rental platform
US20140129113A1 (en) * 2012-11-07 2014-05-08 Ford Global Technologies, Llc Hardware and controls for personal vehicle rental

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19533309A1 (en) 1995-09-08 1997-03-13 Bayerische Motoren Werke Ag Keys for motor vehicles

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020174077A1 (en) * 2000-07-27 2002-11-21 Yasuji Yui Rental system for movable body such as vehicle
DE10137579A1 (en) 2001-08-01 2003-02-27 Siemens Ag Method for transmitting an opening code, method for transmitting a locking code and associated units
GB2402840A (en) 2003-06-10 2004-12-15 Guy Frank Howard Walker Mobile with wireless key entry system
US20050044906A1 (en) 2003-07-25 2005-03-03 Spielman Timothy G. Method and system for setting entry codes via a communications network for access to moveable enclosures
US20060048233A1 (en) 2004-08-30 2006-03-02 Robert Buttross Access control system and method
DE102005034477A1 (en) 2005-07-20 2007-01-25 Sebastian Wolf Identifying and/or locking system for use in motor vehicle, has mobile transmitter unit with signal receiving unit, by which determination, modification and storage of signal to be transmitted are effected in controlling receiver unit
US20110112969A1 (en) 2009-10-30 2011-05-12 Gettaround, Inc. Vehicle access control services and platform
DE102010012565A1 (en) 2010-03-23 2011-09-29 Bayerische Motoren Werke Aktiengesellschaft Method for transmission of data to vehicle key for activating vehicle, involves receiving data of service provider by vehicle key, and charging data of service provider by vehicle into vehicle key
US20110288891A1 (en) * 2010-05-03 2011-11-24 Gettaround, Inc. On-demand third party asset rental platform
US20140129113A1 (en) * 2012-11-07 2014-05-08 Ford Global Technologies, Llc Hardware and controls for personal vehicle rental

Also Published As

Publication number Publication date
DE102013003799A1 (en) 2014-09-11
US20140300446A1 (en) 2014-10-09

Similar Documents

Publication Publication Date Title
RU2708943C1 (en) Key information management device, key information control method and nonvolatile computer-readable medium
US10382412B2 (en) Locking and unlocking system and key unit
US10676066B2 (en) Method for authorizing virtual key and server
US10645578B2 (en) System for using mobile terminals as keys for vehicles
KR102285551B1 (en) A physical key for provisioning a communication device with data that enables access to vehicle resources.
US11164413B2 (en) Access control system with secure pass-through
US11117548B2 (en) Method and system for opening and/or using at least one vehicle
US10589718B2 (en) System and method for controlling access
KR102422326B1 (en) Control system and control mehtod for vehicle
EP2663018B1 (en) Electronic key registration system
CN113503099B (en) Locking/unlocking control system and locking/unlocking control method
US9483889B2 (en) Method for controlling an electronically secured device and transponder for it
US11142166B2 (en) Sharing system using valet key
CN108604396B (en) Method and apparatus relating to a motor vehicle entry and/or start-up system
JP2011511350A (en) Access control management method and apparatus
JP6633589B2 (en) Car sharing system
KR20190056988A (en) Delivery assistance device, delivery assistance method, and non-transitory computer-readable storage medium storing delivery assistance program
JP2019079273A (en) Information processing device, information processing method, and program
JP2005032241A (en) Grant of permission to access resource
JP2011052412A (en) Electronic key system of vehicle
JP2015031035A (en) Key right lending system
CN109639418A (en) A kind of authentication method of configuration information, device and rent-a-car
US20210237686A1 (en) Shared system and control method therefor
KR101638585B1 (en) entrance system exploiting smart phone
WO2019221017A1 (en) Shared system and connection mode switching method

Legal Events

Date Code Title Description
AS Assignment

Owner name: GM GLOBAL TECHNOLOGY OPERATIONS LLC, MICHIGAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NOTHEIS, MATTHIAS;HEBERER, ANDREAS;SIGNING DATES FROM 20140401 TO 20140607;REEL/FRAME:033173/0907

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8